Schedule and Readings
Tentative Topics
Week 1
Week 2
- • Anonymity – Lecture [slides]
- • Censorship and Surveillance – Papers:
- 1. Bill Marczak and Vern Paxson, Engineering Attacks on Government Opponents: Target Perspectives and Defenses, Proceedings on Privacy Enhancing Technologies, Volume 2017, Issue 2
- 2. Stephen Checkoway et al., Where Did I Leave My Keys? Lessons from the Juniper Dual EC Incident, Communications of the ACM, Nov. 2018, Vol. 61, No. 11
- 3. Nguyen Phong Hoang, et al., GFWeb: Measuring the Great Firewall's Web Censorship at Scale, USENIX Security 2024
Week 3
- • Privacy-oriented Cryptography – Lecture [slides]
- • Privacy-oriented Cryptography Case Studies– Papers:
- 1. Henry Corrigan-Gibbs, Dan Boneh, David Mazières, Riposte: An Anonymous Messaging System Handling Millions of Users, IEEE Symposium on Security and Privacy 2015
- 2. Ahmad Sabouri and Kai Rannenberg ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-life, Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2015
Week 4
- • Differential Privacy – Lecture [slides]
- • Differential Privacy Case Studies– Papers:
- 1. Arvind Narayanan and Vitaly Shmatikov, Robust De-anonymization of Large Sparse Datasets, IEEE S&P 2008
- 2. V. Joseph Hotz and Joseph Salvo, A Chronicle of the Application of Differential Privacy to the 2020 Census, Harvard Data Science Review, 2022
Week 5
- • Privacy in Machine Learning – Lecture [slides]
- • Privacy and LLMs– Papers:
- 1. Milad Nasr et al., Scalable Extraction of Training Data from (Production) Language Models, arXiv 2311.17035
- 2. Nicholas Carlini et al., Extracting Training Data from Large Language Models, USENIX Security 2021
Week 6
- • Tracking and Profiling – Lecture [slides]
- • Tracking Case Studies– Papers:
- 1. Janus Varmarken et al., The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking, Privacy Enhancing Technologies Symposium, 2020
- 2. Giridhari Venkatadri et al., Investigating sources of PII used in Facebook's targeted advertising, Privacy Enhancing Technologies Symposium, 2019
Week 7
- • Human Factors in Privacy – Lecture [slides]
- • Human Factors Case Studies– Papers:
- 1. Maggie Oates et al., Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration, Privacy Enhancing Technologies Symposium, 2018
- 2. Rachel Cummings et al., "I need a better description": An Investigation Into User Expectations For Differential Privacy, Journal of Privacy and Confidentiality, 2023
- 3. Oshrat Ayalon et al., Exploring Privacy and Incentives Considerations in Adoption of COVID-19 Contact Tracing Apps, USENIX Security Symposium 2023
Week 8
- • Privacy and Cybersafety – Lecture [slides]
- • Privacy and Law– Papers:
- 1. Aloni Cohen and Kobbi Nissim, Towards formalizing the GDPR's notion of singling out, Proceedings of the National Academy of Sciences (PNAS), 2020
- 2. Aleecia M. McDonald and Lorrie Faith Cranor, The Cost of Reading Privacy Policies, I/S: A Journal of Law and Policy for the Information Society, 2008
Week 9
- • Project work, no class
Week 10
- • Project Presentations [Details TBA]
NB: Most papers should be publicly accessible. If any links are broken, please search for them. If any of them require paid subscription, you can access them for free when connecting on campus. For off-campus access, try UCR VPN.